Thursday, 25 August 2011

IEEE 2010 JAVA PROJECTS


IEEE 2010 JAVA PROJECTS
1.Layered Approach Using Conditional Random Fields for Intrusion Detection.
                    View : Abstract Basepaper   
       Ieee Defendable And Secure Computing
2.Host-to-Host Congestion Control for TCP.
                    View : Abstract Basepaper  
       Ieee Networking
3.A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming.
                    View : Abstract Basepaper  
       Ieee Parallel and Distributed Systems
4 .Bandwidth Recycling in IEEE 802.16 Networks.
                    View : Abstract Basepaper  
       Ieee Mobile Computing
5 .Distributed Explicit Rate Schemes in Multi -Input–Multi-Output Network Systems.
                    View : Abstract Basepaper  
       Ieee Networking
6 .Correlation-Based Traffic Analysis Attacks on Anonymity Networks.
                    View : Abstract Basepaper  
       Ieee Parallel and Distributed Systems
7 .A Review of the Applications of Agent Technology In Traffic and Transportation Systems.
                    View : Abstract Basepaper  
       Ieee Networking Systems
8 .On Modeling, Analysis, and Optimization of Packet Aggregation Systems.
                    View : Abstract Basepaper  
       Ieee Networking
9 .Label-Based DV-Hop Localization AgainstWormhole Attacks in Wireless Sensor Networks.
                    View : Abstract Basepaper  
       Ieee Transactions Wireless Communications
10.Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems.
                    View : Abstract Basepaper  
       Ieee Network Security
11.POPI A User-level Tool for Inferring Router Packet Forwarding Priority.
                    View : Abstract Basepaper  
       Ieee Parallel and Distributed Systems
12.Staying Connected in a Mobile Healthcare System: Experiences from the MediNet Project 
                    View : Abstract Basepaper  
      Ieee Transactions Wireless Communications
13 .Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks.
                    View : Abstract Basepaper   
      Ieee Wireless Communications
14.Mesh Based Multicast Routing in MANET Stable Link Based Approach.
                    View : Abstract Basepaper  
        Ieee Transactions Wireless Communications
15.Random Access Transport Capacity.
                    View : Abstract Basepaper  
        Ieee Transactions Wireless Communications
16.KTR an Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services.
                    View : Abstract Basepaper  
        Ieee Defendable And Secure Computing
17.Cooperative Caching in Wireless P2P Networks Design, Implementation, and Evaluation.
                    View : Abstract Basepaper  
        Ieee Parallel and Distributed Systems
18.Ensuring Data Storage Security in Cloud Computing.
                    View : Abstract Basepaper  
        Ieee Cloud Computing
19.Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes.
                    View : Abstract Basepaper  
        Ieee Mobile Computing
20.on Multihop Distances in Wireless Sensor Networks with Random Node Locations.
                    View : Abstract Basepaper  
        Ieee Mobile Computing
21.Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks.
                    View : Abstract Basepaper  
        Ieee Mobile Computing
22.Always Acyclic Distributed Path Computation.
                    View : Abstract Basepaper  
        Ieee Transactions On Networking
23.Achieving Network Level Privacy in Wireless Sensor Networks.
                    View : Abstract Basepaper  
        Sensor Networking
24.Modified DSR (Preemptive) to reduce link breakage and routing overhead for MANET using Proactive Route Maintenance (PRM).
                    View : Abstract Basepaper  
        Ieee Journal Of Networking
25.Secure Data Objects Replication in Data Grid.
                    View : Abstract Basepaper  
       Ieee Dependable and Secure Computing
26.TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Sensor Networks.
                    View : Abstract Basepaper   
       Ieee Parallel and Distributed Systems
27.IRM Integrated File Replication and Consistency Maintenance in P2P Systems.
                    View : Abstract Basepaper   
       Ieee Parallel and Distributed Systems
28.Distributed Relay-Assignment Protocols for Coverage Expansion in Cooperative Wireless Networks.
                    View : Abstract Basepaper  
       Ieee Mobile Computing
29.Castor Scalable Secure Routing for Ad Hoc Networks.
                    View : Abstract Basepaper  
        Ieee Transactions On Networking
30.Equilibrium of Heterogeneous Congestion Control Optimality and Stability.
                    View : Abstract Basepaper  
        Ieee Transactions On Networking
31.Replication routing in DTNs: a resource allocation approach.
                    View : Abstract Basepaper  
        Ieee Transactions On Networking
32.Client-side Load Balancer using Cloud.
                    View : Abstract Basepaper  
        Ieee Cloud Computing
33.A Cooperative Diversity-based Robust MAC Protocol in Wireless Ad Hoc Networks.
                    View : Abstract Basepaper  
        Ieee Cloud Computing
34.A General Framework for Service Availability for Bandwidth-Efficient Connection-Oriented Networks.
                    View : Abstract Basepaper  
        Ieee Cloud Computing
35.A Novel Cross Layer Intrusion Detection System in MANET.
                    View : Abstract Basepaper  
        Ieee Cloud Computing
36.Network-Based Traitor-Tracing Technique Using Traffic Pattern.
                    View : Abstract Basepaper  
        Ieee Cloud Computing
       PROJECT UNDER DEVELOPMENT GOING
37 .Rate Control With Pair wise Intersession Network Coding.
                
  Ieee Networking
38.Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks.
                 
 Ieee Networking
39.Providing Witness Anonymity Under Peer-to-Peer Settings.
                  
Ieee Mobile Computing
40.On the Performance Bounds of Practical Wireless Network Coding.
                 
 Ieee Network Security
41.Inside the Permutation-Scanning Worms: Propagation Modeling and Analysis.
                  
Ieee Networking
42.VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks.
                  
Ieee Mobile Computing
43.Joint Sink Mobility and Routing to Maximize the Lifetime of Wireless Sensor Networks: The Case of Constrained Mobility.
                  
Ieee Networking
44.A Puzzle-Based Defense Strategy Against Flooding Attacks UsingGame Theory.
                  
Ieee Network Security
45.MABS: Multicast Authentication Based on Batch signature.
                  
Ieee Mobile Computing
46 .SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile Environments.
                  
Ieee Mobile Computing
47.Modeling Power Saving Protocols for Multicast Services in 802.11 Wireless LANs.
                  
Ieee Mobile Computing
48 .A General Framework for Service Availability for Bandwidth-
Efficient Connection-Oriented Networks .

                  
Ieee Networking
49 .DCAR: Distributed Coding-Aware Routing in Wireless Networks.
                  
Ieee Mobile Computing
50 .Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications.
                  
Ieee Networking
51 .Shifting Inference Control to User Side: Architecture and Protocol.
                  
Ieee Network Security
52 .Optimal Relay Station Placement in Broadband Wireless Access Networks.
                  
Ieee Mobile Computing
53 .Using Web-Referral Architectures to Mitigate Denial-of-Service
Threats .

                  
Ieee Network Security
54 .A Parallel Self-Routing Rearrangeable Non-blocking Multi-Photonic Switching Network.
                  
Ieee Networking
55 .Energy-Aware Tag Anti-collision Protocols for RFID Systems.
                  
Ieee Mobile Computing
56 .An Abuse-Free Fair Contract-Signing Protocol Based on the RSA
Signature .

                  
Ieee Network Security
57 .A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks.
                  
Ieee Networking
58 .Channel Assignment for Multi-hop Cellular Networks: Minimum Delay.
                  
Ieee Mobile Computing
59 .Provisioning of Deadline-Driven Requests With Flexible Transmission Rates in WDM Mesh Networks.
                  
Ieee Networking
60 .Secure Client-Side ST-DM Watermark Embedding.
                  
Ieee Network Security
61 .Maximizing Rewards in Wireless Networks with Energy and Timing Constraints for Periodic Data Streams.
                   
Ieee Mobile Computing
62 .Toward Practical Opportunistic Routing With Intra-Session Network Coding for Mesh Networks.
                   
Ieee Networking
63 .TCAM Razor: A Systematic Approach Towards Minimizing Packet Classifiers in TCAMs.
                   
Ieee Networking

0 comments:

Post a Comment

 
Related Posts Plugin for WordPress, Blogger...